SB20240806331 - Amazon Linux AMI update for sudo
Published: August 6, 2024 Updated: October 25, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2022-43995)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary condition within plugins/sudoers/auth/passwd.c when Sudo is configured to use the crypt() password backend (e.g. when passwd authentication is enabled). A local user with access to Sudo can enter a password of 8 characters or fewer to trigger a heap-based buffer over-read and gain access to sensitive information.
2) Input validation error (CVE-ID: CVE-2023-22809)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists within the sudoedit (aka -e) feature due to insufficient validation of user-supplied input passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR). The problem exists because a user-specified editor may contain a "--"
argument that defeats a protection mechanism, e.g., an EDITOR='vim --
/path/to/extra/file' value. A local user can append arbitrary entries to the list of files to process and escalate privileges on the system.
Remediation
Install update from vendor's website.